You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/frontdoor/standard-premium/create-front-door-cli.md
+22-21Lines changed: 22 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,20 +75,22 @@ az appservice plan create \
75
75
76
76
### Create web apps
77
77
78
-
Running the following commands will create a web app in each of the app service plans in the previous step. Web app names have to be globally unique.
78
+
Run [az webapp create](/cli/azure/webapp#az_webapp_create&preserve-view=true) to create a web app in each of the app service plans in the previous step. Web app names have to be globally unique.
79
79
80
-
Create web app with [az webapp create](/cli/azure/webapp#az_webapp_create&preserve-view=true):
80
+
Run [az webapp list-runtimes](/cli/azure/webapp#az_webapp_create&preserve-view=true) to see a list of built-in stacks for web apps.
81
81
82
82
```azurecli
83
83
az webapp create \
84
-
--name WebAppContoso-1 \
84
+
--name WebAppContoso-001 \
85
85
--resource-group myRGFDCentral \
86
-
--plan myAppServicePlanCentralUS
86
+
--plan myAppServicePlanCentralUS \
87
+
--runtime "DOTNETCORE|2.1"
87
88
88
89
az webapp create \
89
-
--name WebAppContoso-2 \
90
+
--name WebAppContoso-002 \
90
91
--resource-group myRGFDEast \
91
-
--plan myAppServicePlanEastUS
92
+
--plan myAppServicePlanEastUS \
93
+
--runtime "DOTNETCORE|2.1"
92
94
```
93
95
94
96
Make note of the default host name of each web app so you can define the backend addresses when you deploy the Front Door in the next step.
@@ -131,11 +133,11 @@ Run [az afd origin create](/cli/azure/afd/origin#az_afd_origin_create) to add an
Run [az network front-door waf-policy create](/cli/azure/network/front-door/waf-policy#az_network_front_door_waf_policy_create) to create a WAF policy for one of your resource groups.
185
187
@@ -189,14 +191,15 @@ Create a new WAF policy for your Front Door. This example creates a policy that'
189
191
az network front-door waf-policy create
190
192
--name contosoWAF /
191
193
--resource-group myRGFDCentral /
194
+
--sku Premium_AzureFrontDoor
192
195
--disabled false /
193
196
--mode Prevention
194
197
```
195
198
196
-
> [!NOTE]
197
-
> If you select `Detection` mode, your WAF doesn't block any requests.
199
+
> [!NOTE]
200
+
> If you select `Detection` mode, your WAF doesn't block any requests.
198
201
199
-
## Create a security policy
202
+
###Create the security policy
200
203
201
204
Run [az afd security-policy create](/cli/azure/afd/security-policy#az_afd_security_policy_create) to apply your WAF policy to the endpoint's default domain.
202
205
@@ -205,21 +208,19 @@ az afd security-policy create \
When you create the Azure Front Door Standard/Premium profile, it takes a few minutes for the configuration to be deployed globally. Once completed, you can access the frontend host you created. In a browser, go to `contoso-frontend.z01.azurefd.net`. Your request will automatically get routed to the nearest server from the specified servers in the origin group.
215
218
216
-
If you created these apps in this quickstart, you'll see an information page.
217
-
218
219
To test instant global failover, we'll use the following steps:
219
220
220
221
1. Open a browser, as described above, and go to the frontend address: `contoso-frontend.azurefd.net`.
221
222
222
-
2. In the Azure portal, search for and select *App services*. Scroll down to find one of your web apps, **WebAppContoso-001** in this example.
223
+
2. In the Azure portal, search for and select *App services*. Scroll down to find one of your web apps, **WebAppContoso-1** in this example.
223
224
224
225
3. Select your web app, and then select **Stop**, and **Yes** to verify.
0 commit comments